The method includes sending a request for permission to transmit by each ready node in the wireless network. Each ready node is a node of the wireless network ready to transmit, each request identifies a node in the network that is the destination, and each request is sent over a control channel. An iterative process based on priorities determined for the ready nodes is then performed to determine which ready nodes to block from transmission and which ready nodes to clear for transmission. transmissions are sent over a payload channel from ready nodes in the clear to transmit state.
|
33. A method of managing transmission in a wireless network at a ready node, comprising:
sending a request for permission to transmit from a ready node, the ready node being a node prepared to transmit, and the request (i) identifying at least one destination node, and (ii) being sent over a control channel;
awaiting reception of a block message or a clear message after the sending;
performing an announce operation, based on the reception, by announcing a transmission state of the ready node, the transmission state being one of (i) a blocked from transmitting state and (ii) a cleared to transmit state, such that
the blocked from transmitting state is a state in which at least one uncleared block message has been received by the ready node, and
the cleared to transmit state is a state in which no uncleared block messages have been received by the ready node;
repeating the performing step for a number of iterations; and
sending transmissions over a payload channel in the clear to transmit state.
18. A method of managing transmission in a wireless network, comprising:
sending a request for permission to transmit by each ready node in the wireless network, each ready node being a node of the wireless network ready to transmit, each request identifying a node in the network that is the destination, and each request being sent over a control channel;
determining, at each destination node, transmission priorities for neighboring nodes that are ready nodes;
selectively sending, by each destination node, block messages and clear messages to the neighboring nodes that are ready nodes based on the determined transmission priorities and announced states of the neighboring nodes that are ready nodes, the block message instructing the neighboring node not to transmit, the clear message clearing any block message previously sent by the destination node, and each announced state indicating whether the ready node is blocked or cleared to transmit; and
sending transmissions over a payload channel from ready nodes in the clear to transmit state after more than one iteration of the determining and selectively sending steps.
19. A method of managing transmission in a wireless network at a destination node, comprising:
receiving, at a destination node, a request for permission to transmit from at least one ready node, the request being sent over a control channel;
performing a block operation by selectively sending block messages to at least one neighboring node based on transmission priorities for the at least one ready node, the block message instructing the at least one neighboring node not to transmit;
receiving an announcement of a transmission state from the at least one ready node, the transmission state being one of (i) a blocked from transmitting state and (ii) a cleared to transmit state, such that
the blocked from transmitting state is a state in which at least one uncleared block message has been received by the ready node, and
the cleared to transmit state is a state in which no uncleared block messages have been received at the ready node;
performing a block/clear operation by selectively sending at least one of (i) further block messages and (ii) clear messages to the at least one neighboring node based on the transmission state of each of the at least one neighboring nodes, the clear message clearing a previously sent block message;
repeating the performing a block/clear operation step for a number of iterations; and
receiving transmissions over a payload channel in the clear to transmit state.
1. A method of managing transmission in a wireless network, comprising:
sending a request for permission to transmit by each ready node in the wireless network, each ready node being a node of the wireless network ready to transmit, each request identifying a node in the network that is the destination, and each request being sent over a control channel;
performing a block operation at each destination node such that each destination node selectively sends block messages to neighboring nodes based on respective transmission priorities for the ready nodes neighboring the destination node, the block message instructing the neighboring node not to transmit;
performing an announce operation at each ready node to announce a transmission state of the ready node, the transmission state being one of a blocked from transmitting state and a cleared to transmit state, the blocked from transmitting state being a state in which at least one uncleared block message has been received by the ready node, and the cleared to transmit state being a state in which no uncleared block messages have been received at the ready node;
performing a block/clear operation at each destination node such that each destination node selectively sends block messages and clear messages to neighboring nodes based on the transmission state of each neighboring node, the clear message clearing any block message previously sent by the destination node;
repeating the announce and block/clear operations for a number of iterations; and
sending transmissions over a payload channel from ready nodes in the clear to transmit state.
2. The method of
the control channel is divided into timeslots, each timeslot is divided into minislots, and each minislot is divided into microslots; and
the request for permission to transmit sent by each ready node is sent at an assigned microslot.
3. The method of
advertising, by each node, assignment of microslots to the node and to one-slot neighbors of the node over a contention channel;
detecting conflicts with microslot assignments;
choosing randomly a replacement microslot from unused microslots if a conflict is detected.
4. The method of
determining a priority number for each ready node neighboring the destination node;
determining a priority number for the destination node if the destination node is also a ready node;
determining nodes to be blocked based on the determined priority numbers; and
sending a block message to each of the nodes determined to be blocked.
5. The method of
determining the ready node with the highest priority number among a set containing the ready nodes neighboring the destination node and the destination node, if the destination node is a ready node;
determining to block the ready nodes requesting permission to transmit to the destination node if the destination node is determined to have the highest priority number among the set;
determining to block the ready nodes neighboring the destination node that have requested permission to transmit to the destination node if the ready node determined to have the highest priority number among the set has requested permission to transmit to a node other than the destination node; and
determining to block the ready nodes neighboring the destination node, except for the ready node determined to have the highest priority number among the set, if this node requested permission to transmit to the destination node.
6. The method of
sending an announce message indicating the ready node is in the blocked from transmission state if the ready node has received at least one uncleared block message; and
sending an announce message indicating the ready node is in the cleared to transmit state if the ready node has not received at least one uncleared block message.
7. The method of
8. The method of
determining a priority number for each ready node neighboring the destination node;
determining a priority number for the destination node if the destination node is also a ready node;
determining the ready node with the highest priority number among a set containing the ready nodes neighboring the destination node and the destination node, if the destination node is a ready node;
determining to block the ready nodes requesting permission to transmit to the destination node if the destination node is determined to have the highest priority number among the set;
determining to block the ready nodes neighboring the destination node that have requested permission to transmit to the destination node if the ready node determined to have the highest priority number among the set has requested permission to transmit to a node other than the destination node;
determining to block the ready nodes neighboring the destination node, except for the ready node determined to have the highest priority number among the set, if this node requested permission to transmit to the destination node;
determining to clear the ready nodes neighboring the destination node that have requested permission to transmit to a node other than the destination node if no nodes neighboring the destination node are in the cleared to transmit state and the ready node with the highest priority number requested permission to transmit to a node other than the destination node; and
determining to clear an identified node neighboring the destination node if no nodes neighboring the destination node are in the cleared to transmit state and the identified neighboring node requests permission to transmit to the destination node, the identified neighboring node being the node neighboring the destination node with the highest priority number.
9. The method of
sending, from each destination node receiving a transmission on the payload channel, an acknowledgement over the payload channel.
10. The method of
11. The method of
12. The method of
13. The method of
14. The method of
15. The method of
16. The method of
20. The method of
determining a priority number for each ready node neighboring the destination node;
determining a priority number for the destination node if the destination node is also a ready node; determining nodes to be blocked based on the determined priority numbers; and
sending a block message to each of the nodes to be blocked.
21. The method of
determining a node with a highest priority number among a set, the set containing the priority number for each of the ready nodes neighboring the destination node and the destination node, if the destination node is a ready node;
determining to block ready nodes requesting permission to transmit to the destination node if the destination node is determined to have the highest priority number among the set;
determining to block the ready nodes neighboring the destination node requesting permission to transmit to the destination node if the node with the highest priority number among the set has requested permission to transmit to a node other than the destination node; and
determining to block ready nodes neighboring the destination node, except for a particular ready node, if the particular ready node is determined to have the highest priority number among the set, and if the particular ready node requested permission to transmit to the destination node.
22. The method of
selectively sending at least one of (i) block messages and (ii) clear messages to neighboring nodes based on the transmission state of each neighboring node and the transmission priority of each neighboring node.
23. The method of
determining a priority number for each ready node neighboring the destination node;
determining a priority number for the destination node if the destination node is also a ready node;
determining a node with a highest priority number among a set, the set containing a priority number for each of the ready nodes neighboring the destination node and the destination node, if the destination node is a ready node;
determining to block ready nodes requesting permission to transmit to the destination node if the destination node is determined to have the highest priority number among the set;
determining to block the ready nodes neighboring the destination node requesting permission to transmit to the destination node if the node with the highest priority number among the set has requested permission to transmit to a node other than the destination node;
determining to block ready nodes neighboring the destination node, except for a particular ready node, if the particular ready node is the determined to have the highest priority number among the set, and the particular ready node requested permission to transmit to the destination node;
determining to clear the ready nodes neighboring the destination node that have requested permission to transmit to a node other than the destination node if no nodes neighboring the destination node are in the cleared to transmit state, and the node with the highest priority number requested permission to transmit to the node other than the destination node; and
determining to clear an identified node neighboring the destination node if no nodes neighboring the destination node are in the cleared to transmit state, and the identified neighboring node requests permission to transmit to the destination node, the identified neighboring node being the node neighboring the destination node with the highest priority number.
24. The method of
sending, from the destination node, an acknowledgement over the payload channel.
25. The method of
26. The method of
27. The method of
28. The method of
29. The method of
30. The method of
31. The method of
32. The method of
34. The method of
the control channel is divided into timeslots, each timeslot is divided into minislots, and each minislot is divided into microslots; and
the request for permission to transmit sent by the ready node is sent at an assigned microslot.
35. The method of
advertising assignment of microslots to the ready node and to one-slot neighbors of the ready node over a contention channel;
detecting conflicts with microslot assignments; and
choosing randomly a replacement microslot from unused microslots if a conflict is detected.
36. The method of
sending a first announce message indicating the ready node is in the blocked from transmission state if the ready node has received at least one uncleared block message; and
sending a second announce message indicating the ready node is in the cleared to transmit state if the ready node has not received at least one uncleared block message.
|
1. Field
Example embodiments of the present invention are related generally to a method of scheduling data transmission within a wireless communications network.
2. Description of the Related Art
Conventional wireless networks (e.g., WLAN, WAN, etc.) include a plurality of inter-connected nodes, with each node sharing a common wide band transmission channel. If multiple nodes in close proximity to each other transmit data at the same time, the respective data transmissions may interfere with each other, which may reduce throughput and degrade system performance.
A medium access control (MAC) protocol may be used to reduce the number of concurrent data transmissions at mutually interfering nodes in the network. A conventional MAC protocol allows only a subset of the nodes to transmit at any given time in order to reduce the number of “collisions” (e.g., interfering data transmissions).
Generally, a MAC algorithm seeks to schedule data transmissions so as to maximize the data throughput of the wireless network without prohibitive delays, and also to maintain a certain degree of fairness. However, executing a MAC protocol for large networks is difficult and inefficient.
The present invention relates to a method of managing transmission in a wireless network.
In one embodiment, the method includes sending a request for permission to transmit by each ready node in the wireless network. Each ready node is a node of the wireless network ready to transmit, each request identifies a node in the network that is the destination, and each request is sent over a control channel. A block operation is performed at each destination node such that each destination node selectively sends block messages to neighboring nodes based on respective transmission priorities for the ready nodes neighboring the destination node. The block messages instruct the neighboring node not to transmit. An announce operation is performed at each ready node to announce a transmission state of the ready node. The transmission state is one of a blocked-from-transmitting state and a cleared-to-transmit state. The blocked-from-transmitting state is a state in which at least one uncleared block message has been received by the ready node, and the cleared-to-transmit state is a state in which no uncleared block messages have been received at the ready node. A block/clear operation is performed at each destination node such that each destination node selectively sends block messages and clear messages to neighboring nodes based on the transmission state of each neighboring node. The clear message clears any block message previously sent by the destination node. The announce and block/clear operations are repeated for a number of iterations, and transmissions are sent over a payload channel from ready nodes in the cleared-to-transmit state.
Example embodiments will become more fully understood from the detailed description provided below and the accompanying drawings, wherein like elements are represented by like reference numerals, which are given by way of illustration only and thus are not limiting of the present invention and wherein:
In order to better understand the present invention, an example wireless network will be described, followed by a description of a transmission scheduling process performed within the wireless Network. Then, a discussion of load on a control channel, which is used to support the transmission scheduling process, will be described.
In the example embodiment of
In the example embodiment of
The assumptions regarding the wireless network 200 will now be described in greater detail.
For a given representative pair of nodes i and j (e.g., nodes 205 and 210), nodes i and j may either be classified as neighbors or “one-hop” neighbors if nodes i and j are capable of direct communication, or as non-neighbors.
In an example, if node i transmits to node j, which is a neighbor of node i, and a third node (e.g., node 215 in
It is understood that in the “real world” classifying non-neighbors of node j as being incapable of interfering with reception at node j is not necessarily always the case. However, it will be hereafter assumed that non-neighbors of a given node (e.g., node k) are incapable of interfering with the given node within the context of example embodiments described below. This assumption is discussed below in greater detail.
It is further assumed that a node cannot receive and transmit during the same timeslot, and that each node within the wireless network 200 is “synchronized” such that timeslots and/or frames at each node in the wireless network are aligned.
Further, the example embodiments described below are not addressing “routing” of messages (i.e., choosing a complete multi-hop route from the node generating a message to the destination node), but rather are limited to one-hop data transfers between neighbor nodes within the wireless network 200. However, it will be readily appreciated that a higher-level routing protocol could be implemented within example embodiments in the sense that multiple “hops” may be executed (e.g., in consecutive timeslots) pursuant to the higher-level routing protocol.
Further, if the number of nodes requesting permission to transmit in a given timeslot is denoted as N1 and the number of nodes granted permission to transmit in the given timeslot is denoted as N2, then N2/N1 is a metric that may be used to evaluate the utilization or efficiency of the example transmission scheduling process, as will now be discussed in greater detail.
Within the example embodiment of
As shown in the example embodiment of
Returning to the example embodiment of
In the example embodiment, R may be used to denotes a set of all ready nodes (i.e., nodes requesting to transmit to destination nodes), D may be used to denotes the set of associated destination nodes, “transmit nodes” denote ready nodes that are neighbors of a destination node under consideration, “receive nodes” denote destination nodes that are neighbors of a ready node under consideration, a “Block” command corresponds to a message or instruction sent to a ready node (e.g., over a control channel, which is discussed below in greater detail) instructing the ready node not to transmit and a “Clear” command cancels a Block message previously sent by the node issuing the “Clear” command. Accordingly, if more than one node blocks a ready node from transmitting, it will be appreciated that a Clear command from a single node may not grant the ready node permission to transmit (e.g., unless each node previously sending Block commands issue subsequent Clear commands). Further, it will be appreciated that R and D may overlap, such that a node may qualify as both a ready node and a destination node.
In the example embodiment of
In the example embodiment of
In the example embodiment of
In the example embodiment of
More specifically, the destination node determines the ready node with the highest priority number among the set containing the ready nodes neighboring the destination node and the destination node, if the destination node is a ready node. The destination node determines to block the ready nodes requesting permission to transmit to the destination node if the destination node is determined to have the highest priority number among the set; determines to block the ready nodes neighboring the destination node that have requested permission to transmit to the destination node if the ready node determined to have the highest priority number among the set has requested permission to transmit to a node other than the destination node; and determines to block the ready nodes neighboring the destination node, except for the ready node determined to have the highest priority number among the set, if this node requested permission to transmit to the destination node. The destination node then send block messages to the nodes determined to be blocked.
Returning to the example embodiment of
In step S320, each ready node within the network 200 performs an ANNOUNCE operation. The ANNOUNCE operation of step S320 will now be described in greater detail with reference to
In the example embodiment of
Returning to the example embodiment of
In the example embodiment of
More specifically, the destination node determines the ready node with the highest priority number among a set containing the ready nodes neighboring the destination node and the destination node, if the destination node is a ready node; determines to block the ready nodes requesting permission to transmit to the destination node if the destination node is determined to have the highest priority number among the set; determines to block the ready nodes neighboring the destination node that have requested permission to transmit to the destination node if the ready node determined to have the highest priority number among the set has requested permission to transmit to a node other than the destination node; determines to block the ready nodes neighboring the destination node, except for the ready node determined to have the highest priority number among the set, if this node requested permission to transmit to the destination node; determining to clear the ready nodes neighboring the destination node that have requested permission to transmit to a node other than the destination node if no nodes neighboring the destination node are in the cleared to transmit state and the ready node with the highest priority number requested permission to transmit to a node other than the destination node; and determines to clear an identified node neighboring the destination node if no nodes neighboring the destination node are in the cleared to transmit state and the identified neighboring node requests permission to transmit to the destination node, the identified neighboring node being the node neighboring the destination node with the highest priority number.
Returning to the example embodiment of
As discussed above, after M is determined to equal 0 in step S315, the process advances to step S335. In step S335, the ANNOUNCE operation (e.g., see step S320) is performed again, followed by the BLOCK operation (e.g., see step S305), and the process of
Following the execution of the process of
During the execution of the process of
From a review of the process of
Further, the method of
Good overall throughput performance may not necessarily correlate with fairness. For example, nodes with a relatively small number of neighbors may expect permission to transmit more often than nodes having many neighbors. While obtaining equal degrees of fairness among nodes may not be possible, the use of priority management via priority numbers may increase the degree of fairness within the network and lower the delay jitter.
The example method of
Initially, assume that each node within network 200 includes an identical maximal length binary feedback shift register (FSR), which, when clocked at the timeslot rate, generates each element of the field of polynomials GF(2m) except the “0” polynomial, where m is a positive integer. The feedback network of the FSR implements an irreducible polynomial of degree m (where m is greater than 1), which is the minimal polynomial of the field element α=t. The polynomial t is therefore a primitive element of the field, and each non-zero element of the field may be represented as t raised to a certain power: 1, t, t2, . . . , t2
The binary number stored in the m stage FSR of each node during the current timeslot is the node's current priority number (PN). Each node may then determine the PN of its neighbors based on the serial numbers of the respective neighbors at any given timeslot. A node i (e.g., having the serial number i) may calculate the current PN of node j by multiplying its own current PN by tj−i (note, t−k=t2
Accordingly, a node may calculate the PN of its neighbors in the coming timeslot based on its own serial number, the serial number of its neighbors, and its current PN. However, due to mobility, the set of neighbors of any node may change in time, and therefore “refreshing” the priority information (e.g., sending serial number and/or current FSR values between the nodes) may be performed periodically (e.g., every a certain number of time slots, etc.).
In order to add a new node to the network, the new node is allocated a unique serial number and then “clocked forward” until the new node is synchronized with the first node (e.g., the number of “clocks” since the initiation of the network or priority management process). The “clock forward” or synchronizing operation may be performed via multiplication with the polynomial t raised to the corresponding power.
Accordingly, the PN of each node may cycle through all 2m−1 values of the finite field. Further, let PNn(T) be the PN of node n at timeslot T. Then, for any subset Φ of nodes, with cardinality CΦ≦N, and any node i∈Φ, arbitrary t, and m large (e.g., m>15), the following is true with high probability:
Accordingly, over a complete period of 2m−1 timeslots, the PN of any node may be larger than the PN of any other node in Φ approximately 1/CΦ times. It will be appreciated that determining the priority number in this manner may increase the degree of fairness during the execution of the method of
Further, while a very specific process for calculating priority numbers of nodes has been described above, it will be appreciated that other example embodiments may calculate priority numbers in any well-known manner.
The example method of
We assume that the control channel is orthogonal to the payload channel, so that control messages can be transmitted on the control channel, while data can be transmitted on the data channel during the same timeslot with no mutual interference. This can be accomplished in many known ways, e.g., through TDMA, i.e., dividing each timeslot to two non-overlapping time intervals, through FDM, i.e., assigning different segments of the spectrum to the two channels, or even through OFDM, where a different sub-carrier can be assigned to support one minislot of the control channel, and each microslot (see below) is implemented as a different time interval on one of the sub-carriers). Whatever the implementation is, we, for convenience, talk about minislots and microslots, as though they are time intervals.
The description of the example method of
As discussed above with respect to
In an example, referring to the example embodiment of
Distributed management of the control channel will now be described in accordance with an example embodiment. In an example, the microslot assignments described below are repeated from time-to-time because the set of, for example, two-hop neighbors changes as a result of node mobility.
As explained above, some minislots are used by ready nodes to transmit control messages to destination nodes, while the rest are used by destination nodes to transmit control messages to ready nodes. To prevent collisions between such transmissions, each minislot is broken down to microslots and a different microslot is assigned to all one and two hop neighbors of each node. In this example embodiment, a contention channel is provided for this purpose. The contention channel is another orthogonal channel (e.g., different time segment, different frequency, etc. from the other channels). Using the contention channel, each node advertises its own microslot, and the microslots used by its one-hop neighbors. The message or advertisement is transmitted relatively infrequently in comparison to the duration of a timeslot, by each node at random times. By monitoring the advertisements of its neighbors, a node may detect conflicts with the assignments of its one-hop and/or two-hop neighbors. If a conflict is detected, a replacement microslot may be randomly selected from among the set of microslots not yet assigned to one of its one or two hop neighbors.
Next, the node advertises the new assignment. Success is not guaranteed in one step, because the same conflict is detected by all nodes involved, and these nodes may attempt concurrent re-assignments to the same microslot. However, when the number of microslots per minislot is sufficiently larger than the maximum number of two-hop neighbors of any node in the network, success is practically guaranteed within several attempts. Note, also, that the mean number of two-hop neighbors is typically lower than the maximum number. The assignment process may be ongoing simultaneously in diverse parts of the network with small localized and temporal effects. Assuming that the network changes slowly, the contention channel should not occupy a significant fraction of the total capacity available to the network.
As explained above, the iterative method of
As discussed above, nodes transmit on the control channel in their appointed microslots, and it is assumed that each neighbor node is aware of the microslot assignments (e.g., through periodic advertisements on the contention channel as discussed above), such that identifying the sender of a message is simply based on the microslot the message is received on
With the above assumptions, the Block messages include space to identify one neighboring node, and another bit to specify the required action. An “Announce” messages include a single bit (e.g., because the source identifier is implicit based on the microslot) to indicate whether or not the sending node is blocked. The “Block/Clear” messages include sufficient space to identify one neighboring node plus two bits. The two bits are required to distinguish between the possible situations discussed above with respect to step S325 and
Accordingly, it will be appreciated that the first minislot contains sufficient space for J nodes to identify their destination nodes. Assuming A bits are required to identify a given node, this means the first minislot may include at least AJ bits. The second minislot (M=0) requires at least J(A+1) bits, M≧1 requires at least JA+(A+1)J+MJ+MJ(A+2)+J+(A+1)J=3J(A+M+1)+JAM bits. In an example, if M=1, A=8, J=20, then 760 bits may be required per timeslot.
With regard to the space (e.g., the number of bits) for the address field to identify a given node (e.g., a destination node), it will be appreciated that a unique identification for each node of the network 200, is not really required, because communication, as described above, is limited to one-hop and/or two-hop neighbors. Accordingly, the space for the address field need only be sufficient for “local” unique identification. For example, the address field may be configured to include log2 J bits. In this example, the address stored within the address field may be the index of the microslot assigned the identified node (e.g., which is known to its respective neighbor nodes).
Further, it is understood that the above bit-length examples related to the load on the control channel are given for example purposes only, and “real world” data loads on the control channel may include additional bits, for example, related to a preamble, synchronization, etc. The method of
In an example, the node degree (i.e., the highest number of neighbors for any node in the network) may be limited via local topology control. Topology control is a preparatory process carried out before routing is attempted. Topology control is used by designers of wireless packet networks to lower the node degree, simplify routing and lower the nodes' energy consumption, while preserving strong connectivity. Topology control may reduce or shorten longer branches from routing paths by replacing the longer branches with a series of short hops. The traffic into and out of each node is then routed via a reduced set of neighbors. The number of two-hop neighbors is also thereby reduced. Topology control may also be implemented in a distributed fashion, such that each node may independently execute its respective topology control process. Topology control is well-known in the art and will not be discussed further for the sake of brevity.
In another example, the load or traffic on the control channel may be reduced by grouping a number of timeslots into a single, longer frame. The method of
Example embodiments of the present invention being thus described, it will be obvious that the same may be varied in many ways. For example, while above-described example embodiments are directed to wireless networks, it is understood that other example embodiments of the present invention may be directed to any wireless network having at least a portion being wireless compliant. For example, while not explicitly shown in
Such variations are not to be regarded as a departure from the spirit and scope of the exemplary embodiments of the invention, and all such modifications as would be obvious to one skilled in the art are intended to be included within the scope of the invention.
Patent | Priority | Assignee | Title |
9461792, | Jul 28 2011 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Signaling and procedure design for cellular cluster contending on license-exempt bands |
Patent | Priority | Assignee | Title |
6404756, | Nov 03 1999 | STINGRAY IP SOLUTIONS LLC | Methods and apparatus for coordinating channel access to shared parallel data channels |
6556582, | May 15 2000 | Raytheon BBN Technologies Corp | Systems and methods for collision avoidance in mobile multi-hop packet radio networks |
20030012176, | |||
EP1768438, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 23 2007 | LING, JONATHAN | Lucent Technologies Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019642 | /0851 | |
Jul 24 2007 | AVIDOR, DAN | Lucent Technologies Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019642 | /0851 | |
Jul 25 2007 | Alcatel Lucent | (assignment on the face of the patent) | / | |||
Nov 01 2008 | Lucent Technologies Inc | Alcatel-Lucent USA Inc | MERGER SEE DOCUMENT FOR DETAILS | 027233 | /0104 | |
Nov 21 2011 | Alcatel-Lucent USA Inc | Alcatel Lucent | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027269 | /0694 | |
Jan 30 2013 | Alcatel Lucent | CREDIT SUISSE AG | SECURITY AGREEMENT | 029821 | /0001 | |
Aug 19 2014 | CREDIT SUISSE AG | Alcatel Lucent | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 033868 | /0001 | |
Dec 22 2017 | Alcatel Lucent | WSOU Investments, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 045085 | /0001 | |
May 28 2021 | WSOU Investments, LLC | OT WSOU TERRIER HOLDINGS, LLC | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 056990 | /0081 |
Date | Maintenance Fee Events |
Dec 28 2011 | ASPN: Payor Number Assigned. |
Jul 02 2015 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Sep 02 2019 | REM: Maintenance Fee Reminder Mailed. |
Jan 10 2020 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 10 2020 | M1555: 7.5 yr surcharge - late pmt w/in 6 mo, Large Entity. |
Aug 28 2023 | REM: Maintenance Fee Reminder Mailed. |
Jan 08 2024 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Jan 08 2024 | M1556: 11.5 yr surcharge- late pmt w/in 6 mo, Large Entity. |
Date | Maintenance Schedule |
Jan 10 2015 | 4 years fee payment window open |
Jul 10 2015 | 6 months grace period start (w surcharge) |
Jan 10 2016 | patent expiry (for year 4) |
Jan 10 2018 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 10 2019 | 8 years fee payment window open |
Jul 10 2019 | 6 months grace period start (w surcharge) |
Jan 10 2020 | patent expiry (for year 8) |
Jan 10 2022 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 10 2023 | 12 years fee payment window open |
Jul 10 2023 | 6 months grace period start (w surcharge) |
Jan 10 2024 | patent expiry (for year 12) |
Jan 10 2026 | 2 years to revive unintentionally abandoned end. (for year 12) |